Communication

Security

Authentication

How it communicate?

Permissions usage